DocumentCode :
607307
Title :
DroidLogger: Reveal suspicious behavior of Android applications via instrumentation
Author :
Shuaifu Dai ; Tao Wei ; Wei Zou
Author_Institution :
Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China
fYear :
2012
fDate :
3-5 Dec. 2012
Firstpage :
550
Lastpage :
555
Abstract :
As the mobile devices increased rapidly in recent years, mobile malware is becoming a severe threat to users. Traditional malware detection uses signature-based methods, but these methods can be evaded by obfuscation or polymorphism. So the behavior-based detection techniques were proposed recently. To capture the apps´ behavior, previous works either use OS level tool such as strace to capture system call, or intercept high level API by modifying the virtual machine. However, the information retrieved from the former method is too difficult to understand the program´s behavior, and the technique used in latter method requires to modify the emulator, which it is not compatible when the Android version upgrade. In this paper, we proposed a new light-weight method to understand the applications´ behavior by logging program´s API and corresponding arguments. We build the logging system DroidLogger, which instruments the logging code into the application binary, and prints out the API usage information at run time. We analyzed several malware and show DroidLogger can reveal the malicious behavior effectively.
Keywords :
application program interfaces; information retrieval; invasive software; mobile computing; operating systems (computers); system monitoring; virtual machines; API usage information; Android applications; Android version upgrade; DroidLogger; OS level tool; applications behavior; behavior-based detection techniques; high level API; information retrieval; logging code; logging program; logging system; malicious behavior; malware detection; mobile devices; mobile malware; obfuscation; polymorphism; program behavior; signature-based methods; suspicious behavior; virtual machine; Android; Behavior; Instrumentation; Malware Detection; Suspicious API;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing and Convergence Technology (ICCCT), 2012 7th International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-1-4673-0894-6
Type :
conf
Filename :
6530396
Link To Document :
بازگشت